Dissection of nation-state motives in cyber attacks featured in first publication by NATO on strategic cyber security.

Milpitas, CA -- March 13, 2014 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the publication by the North Atlantic Treaty Organization Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) of a research paper entitled “Pandemonium: Nation States, National Security, and the Internet”. It is the first paper in the first volume of a new research series on strategic cyber security called “The Tallinn Papers” – named after the city that suffered a massive international cyber attack in 2007.

“Pandemonium” was written by FireEye senior global threat analyst Dr. Kenneth Geers, and adapted from the FireEye 2013 report entitled “World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks,” authored by Geers; Darien Kindlund, director of threat research; Ned Moran, senior malware researcher; and Rob Rachwald, senior director of market research at FireEye. It examines the growing connection between network security and national security by placing a wide range of international cyber attacks within a broader geopolitical context.

“As the concept of cyber war moves from theory to reality, it is critical that cyber defense researchers – as well as the public – understand the role that professional hackers and advanced malware now play in the international arena,” said Dr. Geers. “It is truly an honor to collaborate with one of the world’s leading cyber security research institutions – NATO CCD COE – to help educate national security thinkers and decision makers on the topic of strategic cyber security. These threats are quickly evolving and we have no time to lose.”

The research and analysis featured in “Pandemonium” is the latest in a series of reports released by FireEye. Most recently, the company published its 2013 Advanced Threat Report, which provides an in-depth look at the attacks seen across the FireEye customer base over the course of 2013. The report uncovered command-and-control servers in 206 countries and territories in every corner of the globe, and revealed that attackers trespassed on victim networks, on average, every 1.5 seconds.